• English
  • Deutsch
  • Log In
    Password Login
    Research Outputs
    Fundings & Projects
    Researchers
    Institutes
    Statistics
Repository logo
Fraunhofer-Gesellschaft
  1. Home
  2. Fraunhofer-Gesellschaft
  3. Konferenzschrift
  4. Peak clock: Fault injection into PLL-based systems via clock manipulation
 
  • Details
  • Full
Options
2019
Conference Paper
Title

Peak clock: Fault injection into PLL-based systems via clock manipulation

Abstract
Clock glitches are an inexpensive method to attack embedded systems. Usually the intention is to alter the program flow or to extract cryptographic keys. However, the wide-spread use of Phase Locked Loops (PLLs) prohibits the direct reach-through on the internal clock. Hence, the commonly applied procedure to induce glitches on the external clock does not have any effect on these systems. In this paper, we show by means of two different ARM Cortex-M microcontrollers, that despite the fact that the system clock is derived from the external clock signal by a PLL, fault injection by manipulation of the external clock signal is yet feasible. Even though the process of fault injection is impeded, our results indicate that the risk from this attack vector cannot be eliminated by the use of PLLs. We demonstrate this in practice by successfully performing a differential fault attack on an AES implementation.
Author(s)
Selmke, B.
Hauschild, F.
Obermaier, J.
Mainwork
ASHES 2019, 3rd ACM Workshop on Attacks and Solutions in Hardware Security Workshop. Proceedings  
Conference
Workshop on Attacks and Solutions in Hardware Security (ASHES) <3, 2019, London<  
DOI
10.1145/3338508.3359577
Language
English
Fraunhofer-Institut für Angewandte und Integrierte Sicherheit AISEC  
  • Cookie settings
  • Imprint
  • Privacy policy
  • Api
  • Contact
© 2024